No Password Required: CEO of HACKERverse.ai, Disruptor of Cybersecurity Sales and Most Other Things
Investment Opportunities in Italy's Tech Market
The SaaS Tacks – The Ins and Outs of Negotiating SaaS Contracts
Law School Toolbox Podcast Episode 430: The Paxton AI Founders Talk About Their AI Legal Assistant
CMO Series EP100 - Celebrating 100 episodes and exploring the future of professional services marketing
Medical Device Legal News with Sam Bernstein: Episode 10
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Paralegal Insights: A Collaborative Trademark Practice, Series 3
JONES DAY PRESENTS®: Enhancing Trade Secret Protection in Remote Work Environments
Investigative Power: Utilizing Self Service Solutions for Internal Investigations?
Podcast: Unpacking FDA's Final Clinical Decision Support Guidance - Diagnosing Health Care
Software Escrow: An enterprise resiliency tool every legal department should have in their toolbox (with Don Dennis Jr.)
ASG LegalTech CEO Soumya Nettimi Talks Covid, Racial Injustice and The Future of Legal Payments: On Record PR
E8: Interview with Cookiebot CEO on Technical Solutions to GDPR Readiness
New Revenue Recognition Standard-Part III, Shaking Up the Software Industry?
Unfair and Unbalanced-Episode 19
FCPA Compliance Report-Episode 286-Use of Technology in Supply Chain Risk Management
Compiling Successful IP Solutions for Software Developers
Drafting Software Patents In A Post-Alice World
Polsinelli Podcasts - Hear How the SCOTUS Ruling May Impact Patent-Eligible Subject Matter for Software
IP|Trend: New Era in Protection of Software by Intellectual Property Law?
The risks associated with leveraging open source libraries, and the review needed, are increasing. In the first half of 2025, cybersecurity researchers observed a sharp rise in the incidence of malicious code embedded in...more
Technology vendors everywhere want to serve big Wall Street banks, so when one of those banks talks about risks they see in their software supply chain, compliance and audit professionals should listen – which brings us to an...more
SB 1120 (the “Bill”), which takes effect on January 1, 2025, amends existing California law to adopt guardrails around the use of artificial intelligence tools for the purpose of utilization management. As discussed in a...more
On November 8, 2024, the California Privacy Protection Agency (CPPA) voted 4-1 to proceed with formal rulemaking regarding automated decision-making technology (“ADMT”), which the draft regulations define as “any technology...more
Targeted, Actionable SMART Goals to Help Your Team Drive Greater Efficiency, Compliance, and Strategic Value - We’ve known for a while that legal operations teams are a strategic partner to the wider business, but thanks...more
AI in hiring: About 80% of U.S. and almost all Fortune 500 companies use AI-powered hiring software. AI may be used to target online advertising for job opportunities and to match candidates to jobs on employment platforms...more
USCIS introduced a new Form I-9 to a single-sided sheet. All employers MUST now use the form version released in August 2023. The form is now available in fillable form on tablets and mobile devices...more
Since their introduction in California in 1993, the sales and use taxation of technology transfer agreements has been the subject of significant litigation and a seemingly endless regulation project. In the past few...more
Defense contractors and subcontractors that handle Controlled Unclassified Information (CUI) and do not have robust information-security system controls in place better get their house in order now if they want to do business...more
Essential Guidelines for Ensuring Your Organization is Ready for January 2025. We are more than halfway through the year and the urgency to achieve DORA compliance by the fast-approaching January deadline is becoming...more
Earlier this month, the U.S. Supreme Court resolved a split between the circuit courts over whether the Copyright Act’s three-year statute of limitations limits the amount of damages a plaintiff may recover to a three-year...more
If you have a tendency to reuse the same password across multiple accounts, you could be leaving yourself (and your organization) exposed to risk. Credential stuffing, the stealthy technique fueling a recent explosion of...more
From financial uncertainties to cybersecurity threats, regulatory changes, and everything in between, just how imperative is Enterprise Risk Management (ERM) technology in today’s business environment? According to a...more
In our rapidly evolving digital landscape, all organizations are facing an onslaught of cybersecurity threats. According to recent research, victims of cyber attacks paid out a record $1.1 billion last year and have already...more
The Background: The California Privacy Protection Agency board ("CPPA" or "Board") is in the process of issuing new regulations as authorized under the California Privacy Rights Act. These three sets of proposed regulations...more
Are you aware of the potential risks and consequences that come with outdated I-9 compliance processes? If not, it’s time to pay attention. Maintaining accurate and up-to-date Form I-9s is crucial for businesses to avoid...more
For Human Resources, compliance is king. Ensuring that your organization follows all applicable laws and regulations is a legal obligation and crucial for maintaining a healthy and productive work environment. However,...more
Having handled nearly a 1,000 software compliance audits with copyright clients large and small, I am setting forth my findings of the best to the worst companies, in my opinion, in terms of fairness, undue aggressiveness,...more
Are there strategies to avoid an IRS audit? What are some of the known risks for triggering an IRS audit? What should you do if you have are concerned about the information provided a previous tax return? Is there a way to...more
As part of the annual meeting of the Alabama State Bar Tax Section held in Montgomery on August 16, representatives from the Alabama Department of Revenue (ALDOR) provided a helpful update on some key legislative and...more
Are you familiar with the I-9 Form? It may sound like just another piece of paperwork, but for employers in the United States, it carries significant weight. The I-9 Form is a crucial document used to verify an employee’s...more
Artificial Intelligence (“AI”) programs have gained notoriety by injecting ease into otherwise burdensome and difficult daily tasks. However, as with most innovative advancements, AI has also drawn concern from skeptics...more
Guidance explains the "four-fifths rule" to determine whether tools for hiring and promotion might result in a disparate/adverse impact on a protected class - Last week, the Equal Employment Opportunity Commission (EEOC)...more
The last decade has seen the emergence of Big Data platforms allowing parties to major construction projects to digitize and integrate more and more of the engineering, design and build phase of their projects. Such...more
Introduction - This blog will discuss some of the important aspects of an Autodesk audit when your company receives what we refer to as the “love letter” demanding that a company submit to their software audit request, and...more